Bug 10705

Summary: [Package Request] python-typed-ast
Product: [ROSA-based products] ROSA Fresh Reporter: Zombie Ryushu <zombie.ryushu>
Component: Contributed PackagesAssignee: ROSA Linux Bugs <bugs>
Status: CONFIRMED --- QA Contact: ROSA Linux Bugs <bugs>
Severity: normal    
Priority: Normal CC: alzim, andrey.bondrov, denis.silakov, mc2374
Version: KDE4   
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: https://advisories.mageia.org/MGASA-2020-0249.html
Whiteboard:
Platform: 2016.1 ROSA Vulnerability identifier: CVE-2019-19274 , CVE-2019-19275
RPM Package: python-typed-ast-1.3.1-1.1.mga7 ISO-related:
Bad POT generating: Upstream:

Description Zombie Ryushu 2020-06-14 03:02:12 MSK
Updated python-typed-ast package fixes security vulnerabilities:

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds
read. An attacker with the ability to cause a Python interpreter to
parse Python source (but not necessarily execute it) may be able to crash
the interpreter process. This could be a concern, for example, in a
web-based service that parses (but does not execute) Python code 
(CVE-2019-19274).

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An
attacker with the ability to cause a Python interpreter to parse Python
source but not necessarily execute it) may be able to crash the
interpreter process. This could be a concern, for example, in a web-based
service that parses (but does not execute) Python code (CVE-2019-19275).